In order to improve the management strategy for personnel files in colleges and universities,simplify the complex process of file management,and improve file management security and content preservation of the files.T...In order to improve the management strategy for personnel files in colleges and universities,simplify the complex process of file management,and improve file management security and content preservation of the files.This paper elaborates on the application of Artificial Intelligence(AI)technology in university personnel file management through theoretical analysis based on the understanding of Al technology.展开更多
The aim of this paper is to analyze the sharing and management of files in a tertiary institution using blockchain architecture. It is expected to enable an online system that could provide a decentralized architectur...The aim of this paper is to analyze the sharing and management of files in a tertiary institution using blockchain architecture. It is expected to enable an online system that could provide a decentralized architecture for multiple transfers and sharing of files amongst participants, to design a system that can provide data integrity and security of files using IBM Blockchain technology, to provide a system that can allow multiple user and multiple transactions at once. The research was motivated because of the security challenges associated with existing system which include: delay in transfer and sharing of files, much authority and task given to a single user in a centralized system, high risk of attack and loss of files, reduced speed of file transfer and file access/retrieval, limited number of users per time. Methodology adopted was Object Oriented Analysis Design Methodology (OOADM) in conjunction with Unified Modeling Language (UML) and IBM Blockchain Technology while the programming language used was HTML, CSS, Java and Node Js. The result after design was a decentralized cloud based file sharing and management system that enables multi-shared, replicated and permissioned transactions amongst participants in a network.展开更多
Introduction: the problem of Severe Acute Malnutrition (SAM) and its consequences concern and challenge all social actors worldwide. The objective of the study was to identify the real obstacles that actors face in th...Introduction: the problem of Severe Acute Malnutrition (SAM) and its consequences concern and challenge all social actors worldwide. The objective of the study was to identify the real obstacles that actors face in the integrated management of children aged 6 - 59 months suffering from SAM at the University Hospital of Mother and Child (CHUME) and the Chad-China Friendship Hospital (HATC) of N’Djamena. Methodology: this is a cross-sectional descriptive and interpretative study conducted from January to October 2023 at the CHUME and HATC of N’Djamena. It is based on questionnaires and direct observation of two hundred and thirty-six (236) parents or guardians of malnourished children admitted to these health facilities. All 236 agreed to participate freely in this study. Results: it appears from this study that the obstacles to the integrated management of malnourished children were: poor care-care relationship (26.7%) permanent product breaks (22.9%), the direct costs of services ranged from 30,000 to 60,000 FCFA (41.53%), drugs used for the treatment of patients came from the street (66.10%), malaria and anemia occupy an important place (27.5%), 57.2% respondents had monthly income below 60,000 CFAF. Conclusion: the present study carried out has identified the real bottlenecks to the integrated management of children suffering from SAM in the therapeutic nutritional units of the city of N’Djamena. .展开更多
Starting from the background of the"Double High Plan"in conjunction with the role of personnel file management in advancing the"Double High Plan",this paper analyzes the current status of personnel...Starting from the background of the"Double High Plan"in conjunction with the role of personnel file management in advancing the"Double High Plan",this paper analyzes the current status of personnel file management in higher vocational colleges and the necessity of personnel management in higher vocational colleges,and explores the effective measures to strengthen the informatization of personnel files management to make it more reasonable,standardized and informatized.展开更多
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati...Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.展开更多
With the development of information technology,cloud computing technology has brought many conveniences to all aspects of work and life.With the continuous promotion,popularization and vigorous development of e-govern...With the development of information technology,cloud computing technology has brought many conveniences to all aspects of work and life.With the continuous promotion,popularization and vigorous development of e-government and e-commerce,the number of documents in electronic form is getting larger and larger.Electronic document is an indispensable main tool and real record of e-government and business activities.How to scientifically and effectively manage electronic documents?This is an important issue faced by governments and enterprises in improving management efficiency,protecting state secrets or business secrets,and reducing management costs.This paper discusses the application of cloud computing technology in the construction of electronic file management system,proposes an architecture of electronic file management system based on cloud computing,and makes a more detailed discussion on key technologies and implementation.The electronic file management system is built on the cloud architecture to enable users to upload,download,share,set security roles,audit,and retrieve files based on multiple modes.An electronic file management system based on cloud computing can make full use of cloud storage,cloud security,and cloud computing technologies to achieve unified,reliable,and secure management of electronic files.展开更多
为解决危大工程中吊装作业安全管理的问题,基于深度学习构建目标检测算法(You Only Look Once version 5,YOLOv5)网络模型,针对进入吊装作业区域内人员的防护装备进行多目标融合检测,并对吊钩在施工过程中的状态进行检测。在原始的检测...为解决危大工程中吊装作业安全管理的问题,基于深度学习构建目标检测算法(You Only Look Once version 5,YOLOv5)网络模型,针对进入吊装作业区域内人员的防护装备进行多目标融合检测,并对吊钩在施工过程中的状态进行检测。在原始的检测网络模型中引入4种注意力机制,并通过5种训练模型的结果对比分析,进而选择卷积块注意力模块(Convolutional Block Attention Module,CBAM)最优模型。优化后的检测模型对安全帽的平均识别精度达86.5%,对反光衣的平均识别精度达83.0%,对吊钩的状态识别精度达92.0%。将训练好的人员检测模型和吊钩检测模型打包成exe执行文件,应用到施工安全管理人员的中控平台,可帮助管理人员更好地判断吊装作业的工作情况,进而及时进行风险管控。展开更多
文摘In order to improve the management strategy for personnel files in colleges and universities,simplify the complex process of file management,and improve file management security and content preservation of the files.This paper elaborates on the application of Artificial Intelligence(AI)technology in university personnel file management through theoretical analysis based on the understanding of Al technology.
文摘The aim of this paper is to analyze the sharing and management of files in a tertiary institution using blockchain architecture. It is expected to enable an online system that could provide a decentralized architecture for multiple transfers and sharing of files amongst participants, to design a system that can provide data integrity and security of files using IBM Blockchain technology, to provide a system that can allow multiple user and multiple transactions at once. The research was motivated because of the security challenges associated with existing system which include: delay in transfer and sharing of files, much authority and task given to a single user in a centralized system, high risk of attack and loss of files, reduced speed of file transfer and file access/retrieval, limited number of users per time. Methodology adopted was Object Oriented Analysis Design Methodology (OOADM) in conjunction with Unified Modeling Language (UML) and IBM Blockchain Technology while the programming language used was HTML, CSS, Java and Node Js. The result after design was a decentralized cloud based file sharing and management system that enables multi-shared, replicated and permissioned transactions amongst participants in a network.
文摘Introduction: the problem of Severe Acute Malnutrition (SAM) and its consequences concern and challenge all social actors worldwide. The objective of the study was to identify the real obstacles that actors face in the integrated management of children aged 6 - 59 months suffering from SAM at the University Hospital of Mother and Child (CHUME) and the Chad-China Friendship Hospital (HATC) of N’Djamena. Methodology: this is a cross-sectional descriptive and interpretative study conducted from January to October 2023 at the CHUME and HATC of N’Djamena. It is based on questionnaires and direct observation of two hundred and thirty-six (236) parents or guardians of malnourished children admitted to these health facilities. All 236 agreed to participate freely in this study. Results: it appears from this study that the obstacles to the integrated management of malnourished children were: poor care-care relationship (26.7%) permanent product breaks (22.9%), the direct costs of services ranged from 30,000 to 60,000 FCFA (41.53%), drugs used for the treatment of patients came from the street (66.10%), malaria and anemia occupy an important place (27.5%), 57.2% respondents had monthly income below 60,000 CFAF. Conclusion: the present study carried out has identified the real bottlenecks to the integrated management of children suffering from SAM in the therapeutic nutritional units of the city of N’Djamena. .
文摘Starting from the background of the"Double High Plan"in conjunction with the role of personnel file management in advancing the"Double High Plan",this paper analyzes the current status of personnel file management in higher vocational colleges and the necessity of personnel management in higher vocational colleges,and explores the effective measures to strengthen the informatization of personnel files management to make it more reasonable,standardized and informatized.
文摘Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.
基金research Grants from the National Social Science Foundation of China(Grant No.18FTQ005).The author of the grant is Shi Jin.The URL of the sponsor site is http://www.npopss-cn.gov.cn/.
文摘With the development of information technology,cloud computing technology has brought many conveniences to all aspects of work and life.With the continuous promotion,popularization and vigorous development of e-government and e-commerce,the number of documents in electronic form is getting larger and larger.Electronic document is an indispensable main tool and real record of e-government and business activities.How to scientifically and effectively manage electronic documents?This is an important issue faced by governments and enterprises in improving management efficiency,protecting state secrets or business secrets,and reducing management costs.This paper discusses the application of cloud computing technology in the construction of electronic file management system,proposes an architecture of electronic file management system based on cloud computing,and makes a more detailed discussion on key technologies and implementation.The electronic file management system is built on the cloud architecture to enable users to upload,download,share,set security roles,audit,and retrieve files based on multiple modes.An electronic file management system based on cloud computing can make full use of cloud storage,cloud security,and cloud computing technologies to achieve unified,reliable,and secure management of electronic files.
文摘为解决危大工程中吊装作业安全管理的问题,基于深度学习构建目标检测算法(You Only Look Once version 5,YOLOv5)网络模型,针对进入吊装作业区域内人员的防护装备进行多目标融合检测,并对吊钩在施工过程中的状态进行检测。在原始的检测网络模型中引入4种注意力机制,并通过5种训练模型的结果对比分析,进而选择卷积块注意力模块(Convolutional Block Attention Module,CBAM)最优模型。优化后的检测模型对安全帽的平均识别精度达86.5%,对反光衣的平均识别精度达83.0%,对吊钩的状态识别精度达92.0%。将训练好的人员检测模型和吊钩检测模型打包成exe执行文件,应用到施工安全管理人员的中控平台,可帮助管理人员更好地判断吊装作业的工作情况,进而及时进行风险管控。